Implementation and Design of SHA-1 Algorithm

Abstract

The substantive technologies are having so plenty algorithms for crypto systems. All the technologies are famous for message authentication or message compression techniques like DSA, RSA and SHA- 1.These are majorly streamed on compressed techniques only not on Authentication Requirements like Masquerade, Content Modification, Sequence Modification and Timing Modification. However the previous SHA-1 failure using brute force attack in 280 operations and Collision failure found in 2005 in 233 operations. So we address the above problem and focused on SHA-2 cryptography algorithms.

Authors and Affiliations

Chandra sekhar murala| Research scholar(M.Tech), Dept.of CSE,Nova College of Engineering & Technology, Vegavaram,Jangareddygudem chandumurala@gmail.com, M. Purnasekhar| Asst. professor Dept.of CSE,Nova College of Engineering & Technology, Vegavaram,Jangareddygudem

Keywords

Related Articles

Enhancing Performance of Data Access by using Cooperative Caching in Disruption Tolerant Networks

An interruption tolerant system (DTN) is a system outlined so that transitory or irregular correspondences issues, restrictions and peculiarities have the slightest conceivable antagonistic effect Disruption tolerant...

Protection Assessment of Design Classifiers under Assault

Design arrangement frameworks area unit usually utilized as an area of antagonistic applications, as biometric confirmation, system interruption location, and spam separating, within which info are often deliberately...

Securing Manets By Using An Intrusion Detection System (Eaack)

MANET arrangement may diverge depending on its application from a small static network that is extremely power inhibited to a large-scale, mobile, highly dynamic network. Every node works both as a transmitter and a...

A Method Based On a Monolingual Word Alignment Model

Now a day’s, analyzing the things in the real-time world is completely contrast to the past and makes less burden on the user, even then we have a few problems like syntactical and logical errors. This causes the a...

Efficient IP Trace back Mechanism for Identifying IP Spoofers

is well known that aggressors or spoofers may utilize fake source IP address to hide their genuine areas from victims. So, to catch these spoofers a number of techniques for tracing IP address have been proposed .But...

Download PDF file
  • EP ID EP16355
  • DOI -
  • Views 375
  • Downloads 10

How To Cite

Chandra sekhar murala, M. Purnasekhar (2014). Implementation and Design of SHA-1 Algorithm. International Journal of Science Engineering and Advance Technology, 2(10), 612-613. https://europub.co.uk/articles/-A-16355